]]>By: Reinershttps://websec.wordpress.com/2010/03/19/exploiting-hard-filtered-sql-injections/#comment-1708
Thu, 26 Jul 2012 08:52:55 +0000http://websec.wordpress.com/?p=171#comment-1708There is no way to bypass it. If parenthesis are filtered you can still “union select” etc, but in a blind SQLi scenario you are most likely screwed.
]]>By: vakisahttps://websec.wordpress.com/2010/03/19/exploiting-hard-filtered-sql-injections/#comment-1707
Thu, 26 Jul 2012 08:34:11 +0000http://websec.wordpress.com/?p=171#comment-1707so, how to bypass parenthesis filtering? I’ve search every where and cannot find it.
]]>By: HexRoOt (@Satish_36)https://websec.wordpress.com/2010/03/19/exploiting-hard-filtered-sql-injections/#comment-1001
Sat, 01 Oct 2011 08:37:35 +0000http://websec.wordpress.com/?p=171#comment-1001Thank you sir.
I’ve learned a lot from this post. The last part was just awesome..
]]>